sameer fakhoury
  • Home
  • CTF Writeups
  • Course Summaries
  • Cyber Reports
  • Articles
  • Event Notes
  • About Me
Dark_Web_Dump

Dark_Web_Dump

  • Welcome to challenge 1 in the Track the Hacker Series, a multi-step challenge. You are simulating an attack path as the hacker to take over GlitterCo!
  • For this challenge, d34th dumped some data onto GhostTown in a thread about Dark Web Dumps. Use this information to track down the person’s username and password that he left out on the public web! This will require a bit of social media and other websites to track these credentials down, think you can hack it?
  • Submit the flag as flag{username:password} (case sensitive).
  1. search for deadface GhostTown
  2. image
  3. go to this website → https://ghosttown.deadface.io/ and search for → Dark Web Dumps
  4. image
  5. let’s check the chat between them
    1. image
    2. it’s d34th  and have some dumped files in google drive link
  6. open the google drive link → https://drive.google.com/drive/folders/1tVdSeNgvGCLjhS-nbjhI0-uL3HAtacVY?usp=drive_link
  7. image
  8. let’s open the first PDF
    1. image
    2. let’s search for this username → OpticSeltzer69
  9. ill use sherlock
    1. image
    2. I opened all of them non have important information → but twitter one have
  10. open his twitter account → https://twitter.com/OpticSeltzer69
  11. image
  12. search in his twitter account and find just this GitHub post
    1. image
    2. going to his Github → Embed GitHubEmbed GitHub
  13. going to his repositories
    1. image
    2. this is suspicious → going back to the google drive link the last 2 PDF have things related to Glitterco
    3. image
  14. going to BrownGlitter page on GitHub → Embed GitHubEmbed GitHub
    • for me ill directly history of repos
    • image
  15. checking one by one
  16. image
  17. opening → Embed GitHubEmbed GitHub
    1. image
    2. username : jakeg
    3. password : MakeitChocolateRain
  18. flag{jakeg:MakeitChocolateRain}

©sameer fakhoury

GitHubLinkedIn